Openbsd

Openssh

121 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 1.97%
  • Published 07.03.2006 02:02:00
  • Last modified 03.04.2025 01:03:51

OpenSSH on FreeBSD 5.3 and 5.4, when used with OpenPAM, does not properly handle when a forked child process terminates during PAM authentication, which allows remote attackers to cause a denial of service (client connection refusal) by connecting mu...

  • EPSS 0.08%
  • Published 25.01.2006 11:03:00
  • Last modified 03.04.2025 01:03:51

scp in OpenSSH 4.2p1 allows attackers to execute arbitrary commands via filenames that contain shell metacharacters or spaces, which are expanded twice.

  • EPSS 0.7%
  • Published 06.09.2005 17:03:00
  • Last modified 03.04.2025 01:03:51

OpenSSH 4.0, and other versions before 4.2, does not properly handle dynamic port forwarding ("-D" option) when a listen address is not provided, which may cause OpenSSH to enable the GatewayPorts functionality.

  • EPSS 2.7%
  • Published 06.09.2005 17:03:00
  • Last modified 03.04.2025 01:03:51

sshd in OpenSSH before 4.2, when GSSAPIDelegateCredentials is enabled, allows GSSAPI credentials to be delegated to clients who log in using non-GSSAPI methods, which could cause those credentials to be exposed to untrusted users or hosts.

  • EPSS 0.07%
  • Published 23.08.2005 04:00:00
  • Last modified 03.04.2025 01:03:51

SSH, as implemented in OpenSSH before 4.0 and possibly other implementations, stores hostnames, IP addresses, and keys in plaintext in the known_hosts file, which makes it easier for an attacker that has compromised an SSH user's account to generate ...

  • EPSS 4.85%
  • Published 31.12.2004 05:00:00
  • Last modified 03.04.2025 01:03:51

sshd.c in OpenSSH 3.6.1p2 and 3.7.1p2 and possibly other versions, when using privilege separation, does not properly signal the non-privileged process when a session has been terminated after exceeding the LoginGraceTime setting, which leaves the co...

  • EPSS 0.3%
  • Published 31.12.2004 05:00:00
  • Last modified 03.04.2025 01:03:51

sshd in OpenSSH 3.5p1, when PermitRootLogin is disabled, immediately closes the TCP connection after a root login attempt with the correct password, but leaves the connection open after an attempt with an incorrect password, which makes it easier for...

  • EPSS 0.38%
  • Published 31.08.2004 04:00:00
  • Last modified 03.04.2025 01:03:51

The default configuration for OpenSSH enables AllowTcpForwarding, which could allow remote authenticated users to perform a port bounce, when configured with an anonymous access program such as AnonCVS.

  • EPSS 0.31%
  • Published 18.08.2004 04:00:00
  • Last modified 03.04.2025 01:03:51

Directory traversal vulnerability in scp for OpenSSH before 3.4p1 allows remote malicious servers to overwrite arbitrary files. NOTE: this may be a rediscovery of CVE-2000-0992.

  • EPSS 1.27%
  • Published 31.12.2003 05:00:00
  • Last modified 03.04.2025 01:03:51

sshd in OpenSSH 3.6.1p2 and earlier, when PermitRootLogin is disabled and using PAM keyboard-interactive authentication, does not insert a delay after a root login attempt with the correct password, which makes it easier for remote attackers to use t...